Skip to main content

Cryptanalysis of User Authentication Scheme Preserving Anonymity for Ubiquitous Devices

  • Conference paper
  • First Online:
Advances in Computer Science and Ubiquitous Computing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 373))

Abstract

As the mobile network such as using cell phone, tablet PC, notebook services are gradually increased, a smart card comes to one of the useful thing, because of its convenience and portable. Contemporary, smart card-based authentication also can be one of the most generally authentication method. In 2015, Djellali et al. proposed user authentication scheme with preserving user anonymity and mutual authentication. Also, it provides light and profitable mechanism which can be easily applied to limited power or resources. They claimed their scheme is resisted many networks threat. Unfortunately, we discover some vulnerable weakness. In this paper, we demonstrate that their scheme is still unstable to some network threats, such as insider attack, offline-password guessing attack, impersonation attack and replay attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11), 770–772 (1981)

    Article  MathSciNet  Google Scholar 

  2. Xu, J., Zhu, W.-T., Feng, D.-G.: An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces 31(4), 723–728 (2009)

    Article  Google Scholar 

  3. Song, R.: Advanced smart card based password authentication protocol. Computer Standards & Interfaces 32(5), 321–325 (2010)

    Article  Google Scholar 

  4. Shiuh-Jeng, W., Jin-Fu, C.: Smart card based secure password authentication scheme. Computers & Security 15(3), 231–237 (1996)

    Article  Google Scholar 

  5. Jeon, W., Lee, Y., Won, D.: An efficient user authentication scheme with smart cards for wireless communications. International Journal of Security & Its Applications 7(4), 1–5 (2013)

    Google Scholar 

  6. Juang, W.-S.: Efficient password authenticated key agreement using smart cards. Computers & Security 23(2), 167–173 (2004)

    Article  Google Scholar 

  7. Choi, Y., et al.: Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics. The Scientific World Journal 2014 (2014)

    Google Scholar 

  8. Chien, H.-Y., Chen, C.-H.: A remote authentication scheme preserving user anonymity. In: 19th International Conference on Advanced Information Networking and Applications, AINA 2005, vol. 2. IEEE (2005)

    Google Scholar 

  9. Yang, J.-H., Chang, C.-C.: An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers & Security 28(3), 138–143 (2009)

    Article  Google Scholar 

  10. Peris-Lopez, P., et al.: EMAP: an efficient mutual-authentication protocol for low-cost RFID tags. In: Otm 2006 Workshops On the Move to Meaningful Internet Systems. Springer, Heidelberg (2006)

    Google Scholar 

  11. Djellali, B., et al.: User authentication scheme preserving anonymity for ubiquitous devices. Security and Communication Networks (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dongho Won .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media Singapore

About this paper

Cite this paper

Kang, D., Mun, J., Lee, D., Won, D. (2015). Cryptanalysis of User Authentication Scheme Preserving Anonymity for Ubiquitous Devices. In: Park, DS., Chao, HC., Jeong, YS., Park, J. (eds) Advances in Computer Science and Ubiquitous Computing. Lecture Notes in Electrical Engineering, vol 373. Springer, Singapore. https://doi.org/10.1007/978-981-10-0281-6_45

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0281-6_45

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0280-9

  • Online ISBN: 978-981-10-0281-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics